|
@ -19,12 +19,16 @@ import ( |
|
|
|
|
|
|
|
|
const ( |
|
|
const ( |
|
|
defaultConnDeadlineSeconds = 3 |
|
|
defaultConnDeadlineSeconds = 3 |
|
|
defaultDialRetryMax = 10 |
|
|
|
|
|
|
|
|
defaultConnWaitSeconds = 60 |
|
|
|
|
|
defaultDialRetries = 10 |
|
|
|
|
|
defaultSignersMax = 1 |
|
|
) |
|
|
) |
|
|
|
|
|
|
|
|
// Socket errors.
|
|
|
// Socket errors.
|
|
|
var ( |
|
|
var ( |
|
|
ErrDialRetryMax = errors.New("Error max client retries") |
|
|
|
|
|
|
|
|
ErrDialRetryMax = errors.New("Error max client retries") |
|
|
|
|
|
ErrConnWaitTimeout = errors.New("Error waiting for external connection") |
|
|
|
|
|
ErrConnTimeout = errors.New("Error connection timed out") |
|
|
) |
|
|
) |
|
|
|
|
|
|
|
|
var ( |
|
|
var ( |
|
@ -34,10 +38,16 @@ var ( |
|
|
// SocketClientOption sets an optional parameter on the SocketClient.
|
|
|
// SocketClientOption sets an optional parameter on the SocketClient.
|
|
|
type SocketClientOption func(*SocketClient) |
|
|
type SocketClientOption func(*SocketClient) |
|
|
|
|
|
|
|
|
// SocketClientTimeout sets the timeout for connecting to the external socket
|
|
|
|
|
|
// address.
|
|
|
|
|
|
func SocketClientTimeout(timeout time.Duration) SocketClientOption { |
|
|
|
|
|
return func(sc *SocketClient) { sc.connectTimeout = timeout } |
|
|
|
|
|
|
|
|
// SocketClientConnDeadline sets the read and write deadline for connections
|
|
|
|
|
|
// from external signing processes.
|
|
|
|
|
|
func SocketClientConnDeadline(deadline time.Duration) SocketClientOption { |
|
|
|
|
|
return func(sc *SocketClient) { sc.connDeadline = deadline } |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// SocketClientConnWait sets the timeout duration before connection of external
|
|
|
|
|
|
// signing processes are considered to be unsuccessful.
|
|
|
|
|
|
func SocketClientConnWait(timeout time.Duration) SocketClientOption { |
|
|
|
|
|
return func(sc *SocketClient) { sc.connWaitTimeout = timeout } |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
// SocketClient implements PrivValidator, it uses a socket to request signatures
|
|
|
// SocketClient implements PrivValidator, it uses a socket to request signatures
|
|
@ -45,11 +55,13 @@ func SocketClientTimeout(timeout time.Duration) SocketClientOption { |
|
|
type SocketClient struct { |
|
|
type SocketClient struct { |
|
|
cmn.BaseService |
|
|
cmn.BaseService |
|
|
|
|
|
|
|
|
conn net.Conn |
|
|
|
|
|
privKey *crypto.PrivKeyEd25519 |
|
|
|
|
|
|
|
|
addr string |
|
|
|
|
|
connDeadline time.Duration |
|
|
|
|
|
connWaitTimeout time.Duration |
|
|
|
|
|
privKey *crypto.PrivKeyEd25519 |
|
|
|
|
|
|
|
|
addr string |
|
|
|
|
|
connectTimeout time.Duration |
|
|
|
|
|
|
|
|
conn net.Conn |
|
|
|
|
|
listener net.Listener |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
// Check that SocketClient implements PrivValidator2.
|
|
|
// Check that SocketClient implements PrivValidator2.
|
|
@ -62,24 +74,37 @@ func NewSocketClient( |
|
|
privKey *crypto.PrivKeyEd25519, |
|
|
privKey *crypto.PrivKeyEd25519, |
|
|
) *SocketClient { |
|
|
) *SocketClient { |
|
|
sc := &SocketClient{ |
|
|
sc := &SocketClient{ |
|
|
addr: socketAddr, |
|
|
|
|
|
connectTimeout: time.Second * defaultConnDeadlineSeconds, |
|
|
|
|
|
privKey: privKey, |
|
|
|
|
|
|
|
|
addr: socketAddr, |
|
|
|
|
|
connDeadline: time.Second * defaultConnDeadlineSeconds, |
|
|
|
|
|
connWaitTimeout: time.Second * defaultConnWaitSeconds, |
|
|
|
|
|
privKey: privKey, |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
sc.BaseService = *cmn.NewBaseService(logger, "privValidatorSocketClient", sc) |
|
|
|
|
|
|
|
|
sc.BaseService = *cmn.NewBaseService(logger, "SocketClient", sc) |
|
|
|
|
|
|
|
|
return sc |
|
|
return sc |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
// OnStart implements cmn.Service.
|
|
|
// OnStart implements cmn.Service.
|
|
|
func (sc *SocketClient) OnStart() error { |
|
|
func (sc *SocketClient) OnStart() error { |
|
|
if err := sc.BaseService.OnStart(); err != nil { |
|
|
|
|
|
return err |
|
|
|
|
|
|
|
|
if sc.listener == nil { |
|
|
|
|
|
if err := sc.listen(); err != nil { |
|
|
|
|
|
sc.Logger.Error( |
|
|
|
|
|
"OnStart", |
|
|
|
|
|
"err", errors.Wrap(err, "failed to listen"), |
|
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
|
|
return err |
|
|
|
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
conn, err := sc.connect() |
|
|
|
|
|
|
|
|
conn, err := sc.waitConnection() |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
|
|
|
sc.Logger.Error( |
|
|
|
|
|
"OnStart", |
|
|
|
|
|
"err", errors.Wrap(err, "failed to accept connection"), |
|
|
|
|
|
) |
|
|
|
|
|
|
|
|
return err |
|
|
return err |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
@ -93,7 +118,21 @@ func (sc *SocketClient) OnStop() { |
|
|
sc.BaseService.OnStop() |
|
|
sc.BaseService.OnStop() |
|
|
|
|
|
|
|
|
if sc.conn != nil { |
|
|
if sc.conn != nil { |
|
|
sc.conn.Close() |
|
|
|
|
|
|
|
|
if err := sc.conn.Close(); err != nil { |
|
|
|
|
|
sc.Logger.Error( |
|
|
|
|
|
"OnStop", |
|
|
|
|
|
"err", errors.Wrap(err, "failed to close connection"), |
|
|
|
|
|
) |
|
|
|
|
|
} |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
if sc.listener != nil { |
|
|
|
|
|
if err := sc.listener.Close(); err != nil { |
|
|
|
|
|
sc.Logger.Error( |
|
|
|
|
|
"OnStop", |
|
|
|
|
|
"err", errors.Wrap(err, "failed to close listener"), |
|
|
|
|
|
) |
|
|
|
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
@ -162,7 +201,10 @@ func (sc *SocketClient) SignVote(chainID string, vote *types.Vote) error { |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
// SignProposal implements PrivValidator2.
|
|
|
// SignProposal implements PrivValidator2.
|
|
|
func (sc *SocketClient) SignProposal(chainID string, proposal *types.Proposal) error { |
|
|
|
|
|
|
|
|
func (sc *SocketClient) SignProposal( |
|
|
|
|
|
chainID string, |
|
|
|
|
|
proposal *types.Proposal, |
|
|
|
|
|
) error { |
|
|
err := writeMsg(sc.conn, &SignProposalMsg{Proposal: proposal}) |
|
|
err := writeMsg(sc.conn, &SignProposalMsg{Proposal: proposal}) |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
return err |
|
|
return err |
|
@ -179,7 +221,10 @@ func (sc *SocketClient) SignProposal(chainID string, proposal *types.Proposal) e |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
// SignHeartbeat implements PrivValidator2.
|
|
|
// SignHeartbeat implements PrivValidator2.
|
|
|
func (sc *SocketClient) SignHeartbeat(chainID string, heartbeat *types.Heartbeat) error { |
|
|
|
|
|
|
|
|
func (sc *SocketClient) SignHeartbeat( |
|
|
|
|
|
chainID string, |
|
|
|
|
|
heartbeat *types.Heartbeat, |
|
|
|
|
|
) error { |
|
|
err := writeMsg(sc.conn, &SignHeartbeatMsg{Heartbeat: heartbeat}) |
|
|
err := writeMsg(sc.conn, &SignHeartbeatMsg{Heartbeat: heartbeat}) |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
return err |
|
|
return err |
|
@ -195,166 +240,206 @@ func (sc *SocketClient) SignHeartbeat(chainID string, heartbeat *types.Heartbeat |
|
|
return nil |
|
|
return nil |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
func (sc *SocketClient) connect() (net.Conn, error) { |
|
|
|
|
|
retries := defaultDialRetryMax |
|
|
|
|
|
|
|
|
|
|
|
RETRY_LOOP: |
|
|
|
|
|
for retries > 0 { |
|
|
|
|
|
if retries != defaultDialRetryMax { |
|
|
|
|
|
time.Sleep(sc.connectTimeout) |
|
|
|
|
|
|
|
|
func (sc *SocketClient) acceptConnection() (net.Conn, error) { |
|
|
|
|
|
conn, err := sc.listener.Accept() |
|
|
|
|
|
if err != nil { |
|
|
|
|
|
if !sc.IsRunning() { |
|
|
|
|
|
return nil, nil // Ignore error from listener closing.
|
|
|
} |
|
|
} |
|
|
|
|
|
return nil, err |
|
|
|
|
|
|
|
|
retries-- |
|
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
conn, err := cmn.Connect(sc.addr) |
|
|
|
|
|
if err != nil { |
|
|
|
|
|
sc.Logger.Error( |
|
|
|
|
|
"sc connect", |
|
|
|
|
|
"addr", sc.addr, |
|
|
|
|
|
"err", errors.Wrap(err, "connection failed"), |
|
|
|
|
|
) |
|
|
|
|
|
|
|
|
if err := conn.SetDeadline(time.Now().Add(sc.connDeadline)); err != nil { |
|
|
|
|
|
return nil, err |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
continue RETRY_LOOP |
|
|
|
|
|
|
|
|
if sc.privKey != nil { |
|
|
|
|
|
conn, err = p2pconn.MakeSecretConnection(conn, sc.privKey.Wrap()) |
|
|
|
|
|
if err != nil { |
|
|
|
|
|
return nil, err |
|
|
} |
|
|
} |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
if err := conn.SetDeadline(time.Now().Add(connDeadline)); err != nil { |
|
|
|
|
|
sc.Logger.Error( |
|
|
|
|
|
"sc connect", |
|
|
|
|
|
"err", errors.Wrap(err, "setting connection timeout failed"), |
|
|
|
|
|
) |
|
|
|
|
|
continue |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
return conn, nil |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
if sc.privKey != nil { |
|
|
|
|
|
conn, err = p2pconn.MakeSecretConnection(conn, sc.privKey.Wrap()) |
|
|
|
|
|
if err != nil { |
|
|
|
|
|
sc.Logger.Error( |
|
|
|
|
|
"sc connect", |
|
|
|
|
|
"err", errors.Wrap(err, "encrypting connection failed"), |
|
|
|
|
|
) |
|
|
|
|
|
|
|
|
func (sc *SocketClient) listen() error { |
|
|
|
|
|
ln, err := net.Listen(cmn.ProtocolAndAddress(sc.addr)) |
|
|
|
|
|
if err != nil { |
|
|
|
|
|
return err |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
continue RETRY_LOOP |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
sc.listener = netutil.LimitListener(ln, defaultSignersMax) |
|
|
|
|
|
|
|
|
|
|
|
return nil |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// waitConnection uses the configured wait timeout to error if no external
|
|
|
|
|
|
// process connects in the time period.
|
|
|
|
|
|
func (sc *SocketClient) waitConnection() (net.Conn, error) { |
|
|
|
|
|
var ( |
|
|
|
|
|
connc = make(chan net.Conn, 1) |
|
|
|
|
|
errc = make(chan error, 1) |
|
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
|
|
go func(connc chan<- net.Conn, errc chan<- error) { |
|
|
|
|
|
conn, err := sc.acceptConnection() |
|
|
|
|
|
if err != nil { |
|
|
|
|
|
errc <- err |
|
|
|
|
|
return |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
connc <- conn |
|
|
|
|
|
}(connc, errc) |
|
|
|
|
|
|
|
|
|
|
|
select { |
|
|
|
|
|
case conn := <-connc: |
|
|
return conn, nil |
|
|
return conn, nil |
|
|
|
|
|
case err := <-errc: |
|
|
|
|
|
return nil, err |
|
|
|
|
|
case <-time.After(sc.connWaitTimeout): |
|
|
|
|
|
return nil, ErrConnWaitTimeout |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
return nil, ErrDialRetryMax |
|
|
|
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
//---------------------------------------------------------
|
|
|
//---------------------------------------------------------
|
|
|
|
|
|
|
|
|
// PrivValidatorSocketServer implements PrivValidator.
|
|
|
|
|
|
|
|
|
// RemoteSignerOption sets an optional parameter on the RemoteSigner.
|
|
|
|
|
|
type RemoteSignerOption func(*RemoteSigner) |
|
|
|
|
|
|
|
|
|
|
|
// RemoteSignerConnDeadline sets the read and write deadline for connections
|
|
|
|
|
|
// from external signing processes.
|
|
|
|
|
|
func RemoteSignerConnDeadline(deadline time.Duration) RemoteSignerOption { |
|
|
|
|
|
return func(ss *RemoteSigner) { ss.connDeadline = deadline } |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// RemoteSignerConnRetries sets the amount of attempted retries to connect.
|
|
|
|
|
|
func RemoteSignerConnRetries(retries int) RemoteSignerOption { |
|
|
|
|
|
return func(ss *RemoteSigner) { ss.connRetries = retries } |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
// RemoteSigner implements PrivValidator.
|
|
|
// It responds to requests over a socket
|
|
|
// It responds to requests over a socket
|
|
|
type PrivValidatorSocketServer struct { |
|
|
|
|
|
|
|
|
type RemoteSigner struct { |
|
|
cmn.BaseService |
|
|
cmn.BaseService |
|
|
|
|
|
|
|
|
proto, addr string |
|
|
|
|
|
listener net.Listener |
|
|
|
|
|
maxConnections int |
|
|
|
|
|
privKey *crypto.PrivKeyEd25519 |
|
|
|
|
|
|
|
|
addr string |
|
|
|
|
|
chainID string |
|
|
|
|
|
connDeadline time.Duration |
|
|
|
|
|
connRetries int |
|
|
|
|
|
privKey *crypto.PrivKeyEd25519 |
|
|
|
|
|
privVal PrivValidator |
|
|
|
|
|
|
|
|
privVal PrivValidator |
|
|
|
|
|
chainID string |
|
|
|
|
|
|
|
|
conn net.Conn |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
// NewPrivValidatorSocketServer returns an instance of
|
|
|
|
|
|
// PrivValidatorSocketServer.
|
|
|
|
|
|
func NewPrivValidatorSocketServer( |
|
|
|
|
|
|
|
|
// NewRemoteSigner returns an instance of
|
|
|
|
|
|
// RemoteSigner.
|
|
|
|
|
|
func NewRemoteSigner( |
|
|
logger log.Logger, |
|
|
logger log.Logger, |
|
|
chainID, socketAddr string, |
|
|
chainID, socketAddr string, |
|
|
maxConnections int, |
|
|
|
|
|
privVal PrivValidator, |
|
|
privVal PrivValidator, |
|
|
privKey *crypto.PrivKeyEd25519, |
|
|
privKey *crypto.PrivKeyEd25519, |
|
|
) *PrivValidatorSocketServer { |
|
|
|
|
|
proto, addr := cmn.ProtocolAndAddress(socketAddr) |
|
|
|
|
|
pvss := &PrivValidatorSocketServer{ |
|
|
|
|
|
proto: proto, |
|
|
|
|
|
addr: addr, |
|
|
|
|
|
maxConnections: maxConnections, |
|
|
|
|
|
privKey: privKey, |
|
|
|
|
|
privVal: privVal, |
|
|
|
|
|
chainID: chainID, |
|
|
|
|
|
|
|
|
) *RemoteSigner { |
|
|
|
|
|
rs := &RemoteSigner{ |
|
|
|
|
|
addr: socketAddr, |
|
|
|
|
|
chainID: chainID, |
|
|
|
|
|
connDeadline: time.Second * defaultConnDeadlineSeconds, |
|
|
|
|
|
connRetries: defaultDialRetries, |
|
|
|
|
|
privKey: privKey, |
|
|
|
|
|
privVal: privVal, |
|
|
} |
|
|
} |
|
|
pvss.BaseService = *cmn.NewBaseService(logger, "privValidatorSocketServer", pvss) |
|
|
|
|
|
return pvss |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
rs.BaseService = *cmn.NewBaseService(logger, "RemoteSigner", rs) |
|
|
|
|
|
|
|
|
|
|
|
return rs |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
// OnStart implements cmn.Service.
|
|
|
// OnStart implements cmn.Service.
|
|
|
func (pvss *PrivValidatorSocketServer) OnStart() error { |
|
|
|
|
|
ln, err := net.Listen(pvss.proto, pvss.addr) |
|
|
|
|
|
|
|
|
func (rs *RemoteSigner) OnStart() error { |
|
|
|
|
|
conn, err := rs.connect() |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
|
|
|
rs.Logger.Error("OnStart", "err", errors.Wrap(err, "connect")) |
|
|
|
|
|
|
|
|
return err |
|
|
return err |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
pvss.listener = netutil.LimitListener(ln, pvss.maxConnections) |
|
|
|
|
|
|
|
|
|
|
|
go pvss.acceptConnections() |
|
|
|
|
|
|
|
|
go rs.handleConnection(conn) |
|
|
|
|
|
|
|
|
return nil |
|
|
return nil |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
// OnStop implements cmn.Service.
|
|
|
// OnStop implements cmn.Service.
|
|
|
func (pvss *PrivValidatorSocketServer) OnStop() { |
|
|
|
|
|
if pvss.listener == nil { |
|
|
|
|
|
|
|
|
func (rs *RemoteSigner) OnStop() { |
|
|
|
|
|
if rs.conn == nil { |
|
|
return |
|
|
return |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
if err := pvss.listener.Close(); err != nil { |
|
|
|
|
|
pvss.Logger.Error("OnStop", "err", errors.Wrap(err, "closing listener failed")) |
|
|
|
|
|
|
|
|
if err := rs.conn.Close(); err != nil { |
|
|
|
|
|
rs.Logger.Error("OnStop", "err", errors.Wrap(err, "closing listener failed")) |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
func (pvss *PrivValidatorSocketServer) acceptConnections() { |
|
|
|
|
|
for { |
|
|
|
|
|
conn, err := pvss.listener.Accept() |
|
|
|
|
|
|
|
|
func (rs *RemoteSigner) connect() (net.Conn, error) { |
|
|
|
|
|
retries := defaultDialRetries |
|
|
|
|
|
|
|
|
|
|
|
RETRY_LOOP: |
|
|
|
|
|
for retries > 0 { |
|
|
|
|
|
// Don't sleep if it is the first retry.
|
|
|
|
|
|
if retries != defaultDialRetries { |
|
|
|
|
|
time.Sleep(rs.connDeadline) |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
retries-- |
|
|
|
|
|
|
|
|
|
|
|
conn, err := cmn.Connect(rs.addr) |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
if !pvss.IsRunning() { |
|
|
|
|
|
return // Ignore error from listener closing.
|
|
|
|
|
|
} |
|
|
|
|
|
pvss.Logger.Error( |
|
|
|
|
|
"acceptConnections", |
|
|
|
|
|
"err", errors.Wrap(err, "failed to accept connection"), |
|
|
|
|
|
|
|
|
rs.Logger.Error( |
|
|
|
|
|
"connect", |
|
|
|
|
|
"addr", rs.addr, |
|
|
|
|
|
"err", errors.Wrap(err, "connection failed"), |
|
|
) |
|
|
) |
|
|
continue |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
continue RETRY_LOOP |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
if err := conn.SetDeadline(time.Now().Add(connDeadline)); err != nil { |
|
|
if err := conn.SetDeadline(time.Now().Add(connDeadline)); err != nil { |
|
|
pvss.Logger.Error( |
|
|
|
|
|
"acceptConnetions", |
|
|
|
|
|
|
|
|
rs.Logger.Error( |
|
|
|
|
|
"connect", |
|
|
"err", errors.Wrap(err, "setting connection timeout failed"), |
|
|
"err", errors.Wrap(err, "setting connection timeout failed"), |
|
|
) |
|
|
) |
|
|
continue |
|
|
continue |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
if pvss.privKey != nil { |
|
|
|
|
|
conn, err = p2pconn.MakeSecretConnection(conn, pvss.privKey.Wrap()) |
|
|
|
|
|
|
|
|
if rs.privKey != nil { |
|
|
|
|
|
conn, err = p2pconn.MakeSecretConnection(conn, rs.privKey.Wrap()) |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
pvss.Logger.Error( |
|
|
|
|
|
"acceptConnections", |
|
|
|
|
|
"err", errors.Wrap(err, "secret connection failed"), |
|
|
|
|
|
|
|
|
rs.Logger.Error( |
|
|
|
|
|
"sc connect", |
|
|
|
|
|
"err", errors.Wrap(err, "encrypting connection failed"), |
|
|
) |
|
|
) |
|
|
continue |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
continue RETRY_LOOP |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
go pvss.handleConnection(conn) |
|
|
|
|
|
|
|
|
return conn, nil |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
func (pvss *PrivValidatorSocketServer) handleConnection(conn net.Conn) { |
|
|
|
|
|
defer conn.Close() |
|
|
|
|
|
|
|
|
return nil, ErrDialRetryMax |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
func (rs *RemoteSigner) handleConnection(conn net.Conn) { |
|
|
for { |
|
|
for { |
|
|
if !pvss.IsRunning() { |
|
|
|
|
|
|
|
|
if !rs.IsRunning() { |
|
|
return // Ignore error from listener closing.
|
|
|
return // Ignore error from listener closing.
|
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
req, err := readMsg(conn) |
|
|
req, err := readMsg(conn) |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
if err != io.EOF { |
|
|
if err != io.EOF { |
|
|
pvss.Logger.Error("handleConnection", "err", err) |
|
|
|
|
|
|
|
|
rs.Logger.Error("handleConnection", "err", err) |
|
|
} |
|
|
} |
|
|
return |
|
|
return |
|
|
} |
|
|
} |
|
@ -365,29 +450,29 @@ func (pvss *PrivValidatorSocketServer) handleConnection(conn net.Conn) { |
|
|
case *PubKeyMsg: |
|
|
case *PubKeyMsg: |
|
|
var p crypto.PubKey |
|
|
var p crypto.PubKey |
|
|
|
|
|
|
|
|
p, err = pvss.privVal.PubKey() |
|
|
|
|
|
|
|
|
p, err = rs.privVal.PubKey() |
|
|
res = &PubKeyMsg{p} |
|
|
res = &PubKeyMsg{p} |
|
|
case *SignVoteMsg: |
|
|
case *SignVoteMsg: |
|
|
err = pvss.privVal.SignVote(pvss.chainID, r.Vote) |
|
|
|
|
|
|
|
|
err = rs.privVal.SignVote(rs.chainID, r.Vote) |
|
|
res = &SignVoteMsg{r.Vote} |
|
|
res = &SignVoteMsg{r.Vote} |
|
|
case *SignProposalMsg: |
|
|
case *SignProposalMsg: |
|
|
err = pvss.privVal.SignProposal(pvss.chainID, r.Proposal) |
|
|
|
|
|
|
|
|
err = rs.privVal.SignProposal(rs.chainID, r.Proposal) |
|
|
res = &SignProposalMsg{r.Proposal} |
|
|
res = &SignProposalMsg{r.Proposal} |
|
|
case *SignHeartbeatMsg: |
|
|
case *SignHeartbeatMsg: |
|
|
err = pvss.privVal.SignHeartbeat(pvss.chainID, r.Heartbeat) |
|
|
|
|
|
|
|
|
err = rs.privVal.SignHeartbeat(rs.chainID, r.Heartbeat) |
|
|
res = &SignHeartbeatMsg{r.Heartbeat} |
|
|
res = &SignHeartbeatMsg{r.Heartbeat} |
|
|
default: |
|
|
default: |
|
|
err = fmt.Errorf("unknown msg: %v", r) |
|
|
err = fmt.Errorf("unknown msg: %v", r) |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
if err != nil { |
|
|
if err != nil { |
|
|
pvss.Logger.Error("handleConnection", "err", err) |
|
|
|
|
|
|
|
|
rs.Logger.Error("handleConnection", "err", err) |
|
|
return |
|
|
return |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
err = writeMsg(conn, res) |
|
|
err = writeMsg(conn, res) |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
pvss.Logger.Error("handleConnection", "err", err) |
|
|
|
|
|
|
|
|
rs.Logger.Error("handleConnection", "err", err) |
|
|
return |
|
|
return |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
@ -442,6 +527,10 @@ func readMsg(r io.Reader) (PrivValidatorSocketMsg, error) { |
|
|
|
|
|
|
|
|
read := wire.ReadBinary(struct{ PrivValidatorSocketMsg }{}, r, 0, &n, &err) |
|
|
read := wire.ReadBinary(struct{ PrivValidatorSocketMsg }{}, r, 0, &n, &err) |
|
|
if err != nil { |
|
|
if err != nil { |
|
|
|
|
|
if opErr, ok := err.(*net.OpError); ok { |
|
|
|
|
|
return nil, errors.Wrapf(ErrConnTimeout, opErr.Addr.String()) |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
return nil, err |
|
|
return nil, err |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
@ -461,6 +550,9 @@ func writeMsg(w io.Writer, msg interface{}) error { |
|
|
|
|
|
|
|
|
// TODO(xla): This extra wrap should be gone with the sdk-2 update.
|
|
|
// TODO(xla): This extra wrap should be gone with the sdk-2 update.
|
|
|
wire.WriteBinary(struct{ PrivValidatorSocketMsg }{msg}, w, &n, &err) |
|
|
wire.WriteBinary(struct{ PrivValidatorSocketMsg }{msg}, w, &n, &err) |
|
|
|
|
|
if opErr, ok := err.(*net.OpError); ok { |
|
|
|
|
|
return errors.Wrapf(ErrConnTimeout, opErr.Addr.String()) |
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
return err |
|
|
return err |
|
|
} |
|
|
} |